How your Microsoft 365 gets hacked (and how to prevent it)

Wednesday
 
19
 
March
, 
12:10 pm
 - 
12:50 pm
Location
Ballroom

Speakers

Sam Brazier-Hollins

Sam Brazier-Hollins

Head Of Technical Consulting
Fujitsu Cyber

Synopsis

No matter what anyone might tell you, Microsoft 365 is not secure by default, and even less so once you let users, admins and guests into the mix. What's worse, it also holds a lot of sensitive information, and you can access it over the internet. This all adds up to it being a very juicy target for everyone from script kiddies to organised crime to nation-state actors.

Over the last few years our team have seen all manner of attacks targeting Microsoft 365, from simple password sprays to MFA bypasses, and some very sneaky impersonations. We've also seen what settings actually make a real-world difference to your security posture.

In this session I will run you through some attacker techniques we've seen and show you how they work - including the settings they exploit and the tricks they use to bypass security controls. But I'll also how to defeat them by enabling the right things (and turning off the things you don't want), keeping your users and data safe.

Some examples include:

  • Brute force/credential stuffing/password sprays
  • MFA bypasses by exploiting legacy authentication
  • User impersonation and confusing the service desk
  • Adding malicious apps to Entra ID

Note, while it helps to be familiar with the core concepts of Microsoft 365, this presentation doesn't assume you know what every setting does and where to find them - that's what I'm here to show you.

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.